OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include <cert.h> | 5 #include <cert.h> |
6 #include <pk11pub.h> | 6 #include <pk11pub.h> |
7 | 7 |
8 #include <string> | 8 #include <string> |
9 #include <vector> | 9 #include <vector> |
10 | 10 |
(...skipping 305 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
316 cros_->ConnectToWifiNetwork(wifi1); | 316 cros_->ConnectToWifiNetwork(wifi1); |
317 EXPECT_TRUE(wifi1->connected()); | 317 EXPECT_TRUE(wifi1->connected()); |
318 } | 318 } |
319 | 319 |
320 TEST_F(NetworkLibraryStubTest, NetworkConnectWifiWithCertPattern) { | 320 TEST_F(NetworkLibraryStubTest, NetworkConnectWifiWithCertPattern) { |
321 scoped_ptr<base::DictionaryValue> onc_root = | 321 scoped_ptr<base::DictionaryValue> onc_root = |
322 onc::test_utils::ReadTestDictionary("toplevel_wifi_eap_clientcert.onc"); | 322 onc::test_utils::ReadTestDictionary("toplevel_wifi_eap_clientcert.onc"); |
323 base::ListValue* certificates; | 323 base::ListValue* certificates; |
324 onc_root->GetListWithoutPathExpansion(onc::kCertificates, &certificates); | 324 onc_root->GetListWithoutPathExpansion(onc::kCertificates, &certificates); |
325 | 325 |
326 onc::CertificateImporter importer(onc::ONC_SOURCE_USER_IMPORT, | 326 onc::CertificateImporter importer(false /* don't allow webtrust */); |
327 false /* don't allow webtrust */); | |
328 ASSERT_EQ(onc::CertificateImporter::IMPORT_OK, | 327 ASSERT_EQ(onc::CertificateImporter::IMPORT_OK, |
329 importer.ParseAndStoreCertificates(*certificates)); | 328 importer.ParseAndStoreCertificates(*certificates)); |
330 | 329 |
331 WifiNetwork* wifi = cros_->FindWifiNetworkByPath("wifi_cert_pattern"); | 330 WifiNetwork* wifi = cros_->FindWifiNetworkByPath("wifi_cert_pattern"); |
332 | 331 |
333 StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate(); | 332 StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate(); |
334 wifi->SetEnrollmentDelegate(enrollment_delegate); | 333 wifi->SetEnrollmentDelegate(enrollment_delegate); |
335 EXPECT_FALSE(enrollment_delegate->did_enroll); | 334 EXPECT_FALSE(enrollment_delegate->did_enroll); |
336 EXPECT_FALSE(enrollment_delegate->correct_args); | 335 EXPECT_FALSE(enrollment_delegate->correct_args); |
337 | 336 |
338 ASSERT_NE(static_cast<const WifiNetwork*>(NULL), wifi); | 337 ASSERT_NE(static_cast<const WifiNetwork*>(NULL), wifi); |
339 EXPECT_FALSE(wifi->connected()); | 338 EXPECT_FALSE(wifi->connected()); |
340 EXPECT_TRUE(cros_->CanConnectToNetwork(wifi)); | 339 EXPECT_TRUE(cros_->CanConnectToNetwork(wifi)); |
341 EXPECT_FALSE(wifi->connected()); | 340 EXPECT_FALSE(wifi->connected()); |
342 wifi->AttemptConnection( | 341 wifi->AttemptConnection( |
343 base::Bind(&WifiNetworkConnectCallback, cros_, wifi)); | 342 base::Bind(&WifiNetworkConnectCallback, cros_, wifi)); |
344 EXPECT_TRUE(wifi->connected()); | 343 EXPECT_TRUE(wifi->connected()); |
345 EXPECT_TRUE(enrollment_delegate->did_enroll); | 344 EXPECT_TRUE(enrollment_delegate->did_enroll); |
346 EXPECT_TRUE(enrollment_delegate->correct_args); | 345 EXPECT_TRUE(enrollment_delegate->correct_args); |
347 } | 346 } |
348 | 347 |
349 TEST_F(NetworkLibraryStubTest, NetworkConnectVPNWithCertPattern) { | 348 TEST_F(NetworkLibraryStubTest, NetworkConnectVPNWithCertPattern) { |
350 scoped_ptr<base::DictionaryValue> onc_root = | 349 scoped_ptr<base::DictionaryValue> onc_root = |
351 onc::test_utils::ReadTestDictionary("toplevel_openvpn_clientcert.onc"); | 350 onc::test_utils::ReadTestDictionary("toplevel_openvpn_clientcert.onc"); |
352 base::ListValue* certificates; | 351 base::ListValue* certificates; |
353 onc_root->GetListWithoutPathExpansion(onc::kCertificates, &certificates); | 352 onc_root->GetListWithoutPathExpansion(onc::kCertificates, &certificates); |
354 | 353 |
355 onc::CertificateImporter importer(onc::ONC_SOURCE_USER_IMPORT, | 354 onc::CertificateImporter importer(false /* don't allow webtrust */); |
356 false /* don't allow webtrust */); | |
357 ASSERT_EQ(onc::CertificateImporter::IMPORT_OK, | 355 ASSERT_EQ(onc::CertificateImporter::IMPORT_OK, |
358 importer.ParseAndStoreCertificates(*certificates)); | 356 importer.ParseAndStoreCertificates(*certificates)); |
359 | 357 |
360 VirtualNetwork* vpn = cros_->FindVirtualNetworkByPath("vpn_cert_pattern"); | 358 VirtualNetwork* vpn = cros_->FindVirtualNetworkByPath("vpn_cert_pattern"); |
361 | 359 |
362 StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate(); | 360 StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate(); |
363 vpn->SetEnrollmentDelegate(enrollment_delegate); | 361 vpn->SetEnrollmentDelegate(enrollment_delegate); |
364 EXPECT_FALSE(enrollment_delegate->did_enroll); | 362 EXPECT_FALSE(enrollment_delegate->did_enroll); |
365 EXPECT_FALSE(enrollment_delegate->correct_args); | 363 EXPECT_FALSE(enrollment_delegate->correct_args); |
366 | 364 |
(...skipping 127 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
494 | 492 |
495 // TODO(stevenjb): Test network profiles. | 493 // TODO(stevenjb): Test network profiles. |
496 | 494 |
497 // TODO(stevenjb): Test network devices. | 495 // TODO(stevenjb): Test network devices. |
498 | 496 |
499 // TODO(stevenjb): Test data plans. | 497 // TODO(stevenjb): Test data plans. |
500 | 498 |
501 // TODO(stevenjb): Test monitor network / device. | 499 // TODO(stevenjb): Test monitor network / device. |
502 | 500 |
503 } // namespace chromeos | 501 } // namespace chromeos |
OLD | NEW |